Securing CoAP through payload encryption: Using elliptic curve cryptography

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The vision of the IoT is to not only make our everyday lives easier but also at the same time to ensure a secure environment. As the networking world moves closer towards an environment comprising of minimalistic ubiquitous nodes, IoT-based protocols cannot afford to accommodate security vulnerabilities. In this paper, we identify and mitigate the existing security flaws in the CoAP protocol of the IoT. A real-time system is developed to put the mitigated system into use and analyze the enhanced security. Additionally, we quantitatively look to evaluate the vulnerability of current implementation of CoAP and the magnitude of mitigation the method suggested in this paper provides. A secondary quantitative measure is used to prove that the overhead of the applied encryption is acceptable in terms of efficiency for the mitigation achieved.

Author supplied keywords

Cite

CITATION STYLE

APA

Harish, M., Karthick, R., Mohan Rajan, R., & Vetriselvi, V. (2019). Securing CoAP through payload encryption: Using elliptic curve cryptography. In Lecture Notes in Electrical Engineering (Vol. 500, pp. 497–511). Springer Verlag. https://doi.org/10.1007/978-981-13-0212-1_52

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free